Update this IPR disclosure. Note: Updates to IPR disclosures must only be made by authorized
representatives of the original submitters. Updates will automatically
be forwarded to the current Patent Holder's Contact and to the Submitter
of the original IPR disclosure.

B. Does this disclosure relate to an unpublished pending patent application?:
no

'VI'.
Licensing Declaration

The Patent Holder states that its position with respect
to licensing any patent claims contained in the patent(s) or patent
application(s) disclosed above that would necessarily be infringed by
implementation of the technology required by the relevant IETF specification
("Necessary Patent Claims"), for the purpose of implementing such
specification, is as follows(select one licensing declaration option only):

No License Required for Implementers

Licensing information, comments, notes, or URL for further information:

RedPhone Security hereby asserts that the techniques for sending and receiving authorizations defined in TLS Authorizations Extensions (version draft-housley-tls-authz-extns-07.txt) do not infringe upon RedPhone Security's intellectual property rights (IPR). This statement applies only to the IETF Document draft-housley-tls-authz-extns-07.txt (hereafter the "Protocol Document").

The values provided in, and the processing required by the authorizations ("authz_data" in the Protocol Document) sent or received using the techniques defined in TLS Authorizations Extensions are not specified in the Protocol Document. When an implementation generates the authorizations or processes these authorizations in any of the four ways described below, then this practice may be covered by RedPhone Security's patent claims.

1. To issue or validate certificates containing "critical" certificate policies using Object Identifiers within an arc registered to RedPhone Security (e.g. iso.org.dod.internet.private.enterprise.23106). This includes, without limitation, Certificates or Attribute Certificates.

2. To store Agreements and locate Agreements based on authorization data received from a sender, where Agreements are any legally recognizable and documented agreement between two parties, including, without limitation (a) agreements between governing bodies (e.g. treaties, memoranda of understanding), (b) agreements created by governing bodies (e.g. laws, edicts, orders), and (c) other agreements enforceable by governing bodies (e.g. contracts, negotiable instruments).

3. To compare the sender of authorization data to a stored collection of Agreement signers.

4. To sign ("countersign") authorization data received from a sender via the TLS Authorizations Extensions after verifying that the sender's digital signature over those assurances is correct.

RedPhone Security agrees to grant licenses for such uses in a fair and nondiscriminatory manner. This statement applies to the Disclosed Patent Information, including all amendments in all nations as published during the course of prosecution.

Note: The individual submitting this template represents and warrants
that he or she is authorized by the Patent Holder to agree to the
above-selected licensing declaration.